Continuous leakage-resilient identity-based encryption with leakage amplification

被引:0
|
作者
Yanwei Zhou
Bo Yang
Yi Mu
机构
[1] Shaanxi Normal University,School of Computer Science
[2] State Key Laboratory of Cryptology,School of Mathematics and Computer Science
[3] Fujian Normal University,State Key Laboratory of Information Security, Institute of Information Engineering
[4] Chinese Academy of Sciences,undefined
来源
关键词
Identity-based encryption; Continuous leakage-resilience leakage amplification; Chosen ciphertext attacks; 68P25; 68Q30; 68W40; 68Q10;
D O I
暂无
中图分类号
学科分类号
摘要
In modern computer systems, leakage of private information may cause catastrophic consequences, especially those are related to the secret keys in cryptographic mechanisms. Therefore, it has been widely accepted both in academia and industry that cryptographic schemes should withstand various leakage attacks, including the continuous leakage attacks. Although a lot of researches have been conducted towards this issue and some progresses have been made, there are still many unsolved problems in this area. For example, in the majority of the existing identity-based encryption (IBE) schemes with (continuous) leakage resilience, the upper bound of leakage is required to be fixed. But in many real-world applications, such a requirement is inadequate to protect the schemes against the leakage attacks. Moreover, many previous efforts aiming to build IBE schemes that are secure against the chosen-ciphertext attacks (CCA) need to rely on the q-type assumptions. But these solutions are not desirable, because the q-type assumptions are non-static assumptions. In this paper, in order to address the above mentioned problems, we demonstrate how to construct a continuous leakage-resilient CCA-secure IBE scheme with leakage amplification, in which the leakage parameter has an arbitrary length. The benefit is that the length of permitted leakage in our scheme can be adjusted flexibly according to the leakage requirements. Moreover, the security of our proposed scheme can be proved with static assumptions in the standard model. Compared with the related works in the literature, our scheme enjoys a unique feature that it allows continuous leakage of multiple keys simultaneously, e.g. continuous leakage of the master secret key as well as the user’s private key.
引用
收藏
页码:2061 / 2090
页数:29
相关论文
共 50 条
  • [21] Identity-Based Encryption Resilient to Continual Auxiliary Leakage
    Yuen, Tsz Hon
    Chow, Sherman S. M.
    Zhang, Ye
    Yiu, Siu Ming
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 117 - 134
  • [22] Leakage-resilient identity-based cryptography from minimal assumptions
    Zhou, Yanwei
    Yang, Bo
    Qiao, Zirui
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3757 - 3801
  • [23] Leakage-resilient identity-based cryptography from minimal assumptions
    Yanwei Zhou
    Bo Yang
    Zirui Qiao
    Zhe Xia
    Mingwu Zhang
    Yi Mu
    Designs, Codes and Cryptography, 2023, 91 : 3757 - 3801
  • [24] Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
    Kraemer, Juliane
    Struck, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 315 - 337
  • [25] CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions
    Tomita, Toi
    Ogata, Wakaha
    Kurosawa, Kaoru
    Kuwayama, Ryo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1157 - 1166
  • [26] Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    INFORMATICA, 2020, 31 (03) : 597 - 620
  • [27] A continuous leakage-resilient CCA secure identity-based key encapsulation mechanism in the standard model
    Qiao, Zirui
    Zhu, Yasi
    Zhou, Yanwei
    Yang, Bo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 162
  • [28] Identity-based broadcast encryption with continuous leakage resilience
    Li, Jiguo
    Yu, Qihong
    Zhang, Yichen
    INFORMATION SCIENCES, 2018, 429 : 177 - 193
  • [29] Leakage-resilient certificate-based encryption
    Yu, Qihong
    Li, Jiguo
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3346 - 3355
  • [30] After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Yuanyuan
    Zhang, Mingwu
    Zhou, Jing
    Harn, Lein
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 2017 - 2026